HOME
*





Mobile Identity Management
Mobile identity is a development of online authentication and digital signatures, where the SIM card of one’s mobile phone works as an identity tool. Mobile identity enables legally binding authentication and transaction signing for online banking, payment confirmation, corporate services, and consuming online content. The user's certificates are maintained on the telecom operator's SIM card and in order to use them, the user has to enter a personal, secret PIN code. When using mobile identity, no separate card reader is needed, as the phone itself already performs both functions. In contrast to other approaches, the mobile phone in conjunction with a mobile signature-enabled SIM card aims to offer the same security and ease of use as for example smart cards in existing digital identity management systems. Smart card-based digital identities can only be used in conjunction with a card reader and a PC. In addition, distributing and managing the cards can be logistically diffi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit. Methods Authentication is relevant to multiple fields. In art, antiques, and anthropology, a common problem is verifying that a given artifact was produced by a certain person or in a certain place or period of history. In computer science, verifying a user's identity is often required to allow access to confidential data or systems. Authentication can be considered to be of three types: The first type of au ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Digital Data
Digital data, in information theory and information systems, is information represented as a string of discrete symbols each of which can take on one of only a finite number of values from some alphabet, such as letters or digits. An example is a text document, which consists of a string of alphanumeric characters . The most common form of digital data in modern information systems is ''binary data'', which is represented by a string of binary digits (bits) each of which can have one of two values, either 0 or 1. Digital data can be contrasted with ''analog data'', which is represented by a value from a continuous range of real numbers. Analog data is transmitted by an analog signal, which not only takes on continuous values, but can vary continuously with time, a continuous real-valued function of time. An example is the air pressure variation in a sound wave. The word ''digital'' comes from the same source as the words digit and ''digitus'' (the Latin word for ''finger'' ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security ( data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. Cryptography prior to the modern age was effectively synonymo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Government Of Ukraine
The Cabinet of Ministers of Ukraine ( uk, Кабінет Міністрів України, translit=Kabinet Ministriv Ukrainy; shortened to CabMin), commonly referred to as the Government of Ukraine ( uk, Уряд України, ''Uriad Ukrainy''), is the highest body of state executive power in Ukraine. As Cabinet of Ministers of the Ukrainian SSR, it was formed on 18 April 1991, by the Law of Ukrainian SSR No.980-XII. Vitold Fokin was approved as the first Prime Minister of Ukraine. The cabinet is a collegiate body consisting of the cabinet's "presidium" composed of the Prime Minister of Ukraine and their vice prime ministers as well as other ministers who participate and vote on sessions of the cabinet. The prime minister presides over the cabinet. Some vice prime ministers may be appointed as the first vice prime ministers. Unlike the Soviet period of the government when presidium was actually a functioning institution, the current government presidium is nominal and vice ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Mobile ID
A mobile signature is a digital signature generated either on a mobile phone or on a SIM card on a mobile phone. Origins of the term mSign The term first appeared in articles introducing mSign (short for Mobile Electronic Signature Consortium). It was founded in 1999 and comprised 35 member companies. In October 2000, the consortium published an XML-interface defining a protocol allowing service providers to obtain a mobile (digital) signature from a mobile phone subscriber. In 2001, mSign gained industry-wide coverage when it came apparent that Brokat (one of the founding companies) also obtained a process patent in Germany for using the mobile phone to generate digital signatures. ETSI-MSS standardization The term was then used by Paul Gibson (G&D) and Romary Dupuis (France Telecom) in their standardisation work at the European Telecommunications Standards Institute (ETSI) and published in ETSI Technical Report TR 102 203. The ETSI-MSS specifications define a SOAP interface ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Austrian Government
The Government of Austria (german: Bundesregierung der Republik Österreich) is the executive cabinet of the Republic of Austria. It consists of the chancellor, who is the head of government, the vice chancellor and the ministers. Appointment Since the 1929 reform of the Austrian Constitution, all members of the Federal Government are appointed by the Austrian Federal President. As the Federal Government must maintain the confidence of parliament, the President must generally abide by the will of that body in his or her appointments. In practice, the leader of the strongest political party, who ran as a "chancellor candidate" in a parliamentary election, is usually asked to become Federal Chancellor, though there have been some exceptions. Ministers are proposed for nomination by the Chancellor, though the President is permitted to withhold his or her approval. Likewise, the President may dismiss the Chancellor and/or the whole government at any time. If this occurs, a new g ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Automated Teller Machine
An automated teller machine (ATM) or cash machine (in British English) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, funds transfers, balance inquiries or account information inquiries, at any time and without the need for direct interaction with bank staff. ATMs are known by a variety of names, including automatic teller machine (ATM) in the United States (sometimes redundantly as "ATM machine"). In Canada, the term ''automated banking machine'' (ABM) is also used, although ATM is also very commonly used in Canada, with many Canadian organizations using ATM over ABM. In British English, the terms ''cashpoint'', ''cash machine'' and ''hole in the wall'' are most widely used. Other terms include ''any time money'', ''cashline'', ''tyme machine'', ''cash dispenser'', ''cash corner'', ''bankomat'', or ''bancomat''. ATMs that are not operated by a financial i ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Turkcell
Turkcell İletişim Hizmetleri A.Ş. (''lit. Turkcell Communication Services'') (, ) is the leading mobile phone operator of Turkey, based in Istanbul. The company has 39,3 million subscribers as of September 2021. In 2015, the company's number of subscribers climbed to 68.9 million, in nine countries Largest shareholder is Turkey Wealth Fund with 26.2% ownership. It is one of the world's biggest companies (Fortune 2000) list published by ''Fortune''. Turkcell has also developed Yaani, a browser for mobile and desktop. Turkcell's general manager is Murat Erkan. Company background In February 1994, Turkcell started Turkey's first GSM network. In Q3 2012, it had a market share of 52,4%. Its competitors were Vodafone with a market share of 27,9% and Avea with a market share of 19,7%. Turkcell is the first Turkish company to be listed on the New York Stock Exchange, where its shares have been traded since July 11, 2000 along with trading on the Istanbul Stock Exchange. Turkcell ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Estonian ID Card
The Estonian identity card ( et, ID-kaart) is a mandatory identity document for citizens of Estonia. In addition to regular identification of a person, an ID-card can also be used for establishing one's identity in electronic environment and for giving one's digital signature. Within Europe (except Belarus, Russia, Ukraine and United Kingdom) as well as French overseas territories and Georgia, the Estonian ID Card can be used by the citizens of Estonia as a travel document. The mandatory identity document of a citizen of the European Union is also an identity card, also known as an ID card. The Estonian ID Card can be used to cross the Estonian border, however Estonian authorities cannot guarantee that other EU member states will accept the card as a travel document. In addition to regular identification of a person, an ID-card can also be used for establishing one's identity in electronic environment and for giving one's digital signature. With the Estonian ID-card the citizen ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Estonian Government
, image = , date = 24 February 1918 , state = Republic of Estonia , address = Rahukohtu 3, 15161 Tallinn, Estonia , appointed = President of Estonia , leader_title = Prime Minister of Estonia , main_organ = Government Office of Estonia , ministries = , responsible = , url = The Government of the Republic of Estonia ('' Estonian: Vabariigi Valitsus'') is the cabinet of Estonia. Under the Constitution, it exercises executive power pursuant to the Constitution and laws of Estonia. The cabinet carries out the country's domestic and foreign policy, shaped by parliament (Riigikogu); it directs and co-ordinates the work of government institutions and bears full responsibility for everything occurring within the authority of executive power. The government, headed by the Prime Minister, thus represents the political leadership of the country and makes decisions in the name of the whole executive power. The ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]